Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Channel routing (5)
- Area-universal networks (3)
- Computer science (3)
- Parallel computation (3)
- Randomized routing (3)
-
- VLSI layout (3)
- Algorithms (2)
- Experimental (2)
- Fabrication prototypes (2)
- Facade (2)
- Fat-trees (2)
- Heating and cooling (2)
- Hypercube (2)
- Intelligent (2)
- Interconnection networks (2)
- Layout algorithms (2)
- Lower bounds (2)
- Performance evaluation (2)
- Photovoltaic (2)
- Physical testing – mockups (2)
- Single-layer channel routing (2)
- Single-layer routing (2)
- Smart materials (2)
- Thermal imaging (2)
- VLSI (2)
- 3D printing (1)
- Airport (1)
- Antiferromagnetism (1)
- Area-universality (1)
- Arithmetic Cost (1)
Articles 1 - 30 of 56
Full-Text Articles in Entire DC Network
Development And Characterization Of Nano Nickel-Based Conductive Inks For Flexographic Printing Of Electronics And New Interpretations Of Surface Energies Of Solids, Bilge N. Altay
Bilge Nazli Altay
Signal Flow Graph Approach To Efficient Dst I-Iv Algorithms, Sirani M. Perera
Signal Flow Graph Approach To Efficient Dst I-Iv Algorithms, Sirani M. Perera
Sirani Mututhanthrige Perera
In this paper, fast and efficient discrete sine transformation (DST) algorithms are presented based on the factorization of sparse, scaled orthogonal, rotation, rotation-reflection, and butterfly matrices. These algorithms are completely recursive and solely based on DST I-IV. The presented algorithms have low arithmetic cost compared to the known fast DST algorithms. Furthermore, the language of signal flow graph representation of digital structures is used to describe these efficient and recursive DST algorithms having (n1) points signal flow graph for DST-I and n points signal flow graphs for DST II-IV.
The Subject Librarian Newsletter, Engineering And Computer Science, Spring 2018, Buenaventura "Ven" Basco
The Subject Librarian Newsletter, Engineering And Computer Science, Spring 2018, Buenaventura "Ven" Basco
Buenaventura "Ven" Basco
No abstract provided.
The Subject Librarian Newsletter, Engineering And Computer Science, Fall 2017, Buenaventura "Ven" Basco
The Subject Librarian Newsletter, Engineering And Computer Science, Fall 2017, Buenaventura "Ven" Basco
Buenaventura "Ven" Basco
No abstract provided.
Virtual Inertia: Current Trends And Future Directions, Ujjwol Tamraker, Dipesh Shrestha, Manisha Maharjan, Bishnu P. Bhattarai, Timothy M. Hansen, Reinaldo Tonkoski
Virtual Inertia: Current Trends And Future Directions, Ujjwol Tamraker, Dipesh Shrestha, Manisha Maharjan, Bishnu P. Bhattarai, Timothy M. Hansen, Reinaldo Tonkoski
Reinaldo Tonkoski
The modern power system is progressing from a synchronous machine-based system towards an inverter-dominated system, with large-scale penetration of renewable energy sources (RESs) like wind and photovoltaics. RES units today represent a major share of the generation, and the traditional approach of integrating them as grid following units can lead to frequency instability. Many researchers have pointed towards using inverters with virtual inertia control algorithms so that they appear as synchronous generators to the grid, maintaining and enhancing system stability. This paper presents a literature review of the current state-of-the-art of virtual inertia implementation techniques, and explores potential research directions …
Tailoring The Asymmetric Magnetoimpedance Response In Exchange-Biased Ni - Fe Multilayers, Ufuk Kilic, Carolina Ross, Carlos Garcia
Tailoring The Asymmetric Magnetoimpedance Response In Exchange-Biased Ni - Fe Multilayers, Ufuk Kilic, Carolina Ross, Carlos Garcia
Ufuk Kilic
Venkata's Thesis Report.Pdf, Venkata Gadiraju
Venkata's Thesis Report.Pdf, Venkata Gadiraju
Venkata Gadiraju
Dynamical Thermal Conductivity Of Suspended Graphene Ribbons In The Hydrodynamic Regime, Zlatan Aksamija, Arnab K. Majee
Dynamical Thermal Conductivity Of Suspended Graphene Ribbons In The Hydrodynamic Regime, Zlatan Aksamija, Arnab K. Majee
Zlatan Aksamija
Power Dissipation Of Wse2 Field-Effect Transistors Probed By Low- Frequency Raman Thermometry, Zlatan Aksamija, Cameron J. Foss, Arnab K. Majee, Amin Salehi-Khojin
Power Dissipation Of Wse2 Field-Effect Transistors Probed By Low- Frequency Raman Thermometry, Zlatan Aksamija, Cameron J. Foss, Arnab K. Majee, Amin Salehi-Khojin
Zlatan Aksamija
Towards Trustworthy Coordination For Web Services Business Activities, Hua Chai, Hongle Zhang, Wenbing Zhao, P. M. Melliar-Smith, L. E. Moser
Towards Trustworthy Coordination For Web Services Business Activities, Hua Chai, Hongle Zhang, Wenbing Zhao, P. M. Melliar-Smith, L. E. Moser
Wenbing Zhao
We present a lightweight Byzantine fault tolerance (BFT) algorithm, which can be used to render the coordination of web services business activities (WS-BA) more trustworthy. The lightweight design of the BFT algorithm is the result of a comprehensive study of the threats to the WS-BA coordination services and a careful analysis of the state model of WS-BA. The lightweight BFT algorithm uses source ordering, rather than total ordering, of incoming requests to achieve Byzantine fault tolerant, state-machine replication of the WS-BA coordination services. We have implemented the lightweight BFT algorithm, and incorporated it into the open-source Kandula framework, which implements …
Spe: Security And Privacy Enhancement Framework For Mobile Devices, Brian Krupp, Nigamanth Sridhar, Wenbing Zhao
Spe: Security And Privacy Enhancement Framework For Mobile Devices, Brian Krupp, Nigamanth Sridhar, Wenbing Zhao
Wenbing Zhao
In this paper, we present a security and privacy enhancement (SPE) framework for unmodified mobile operating systems. SPE introduces a new layer between the application and the operating system and does not require a device be jailbroken or utilize a custom operating system. We utilize an existing ontology designed for enforcing security and privacy policies on mobile devices to build a policy that is customizable. Based on this policy, SPE provides enhancements to native controls that currently exist on the platform for privacy and security sensitive components. SPE allows access to these components in a way that allows the framework …
Scientific Programming Towards A Smart World, Wenbing Zhao, Xiong Luo, Huaping Liu, Kun Hua, Chaomin Luo
Scientific Programming Towards A Smart World, Wenbing Zhao, Xiong Luo, Huaping Liu, Kun Hua, Chaomin Luo
Wenbing Zhao
No abstract provided.
Low Latency Fault Tolerance System, Wenbing Zhao, P. M. Melliar-Smith, L. E. Moser
Low Latency Fault Tolerance System, Wenbing Zhao, P. M. Melliar-Smith, L. E. Moser
Wenbing Zhao
The Low Latency Fault Tolerance (LLFT) system provides fault tolerance for distributed applications within a local-area network, using a leader-follower replication strategy. LLFT provides application-transparent replication, with strong replica consistency, for applications that involve multiple interacting processes or threads. Its novel system model enables LLFT to maintain a single consistent infinite computation, despite faults and asynchronous communication. The LLFT Messaging Protocol provides reliable, totally-ordered message delivery by employing a group multicast, where the message ordering is determined by the primary replica in the destination group. The Leader-Determined Membership Protocol provides reconfiguration and recovery when a replica becomes faulty and when …
Concurrent Byzantine Fault Tolerance For Software-Transactional-Memory Based Applications, Honglei Zhang, Wenbing Zhao
Concurrent Byzantine Fault Tolerance For Software-Transactional-Memory Based Applications, Honglei Zhang, Wenbing Zhao
Wenbing Zhao
Typical Byzantine fault tolerance algorithms require the application requests to be executed sequentially, which may severely limit the throughput of the system considering that modern CPUs are equipped with multiple processing cores. In this paper, we present the design and implementation of a Byzantine fault tolerance framework for software-transactional-memory based applications that aims to maximize concurrent processing while preserving strong replica consistency. The approach is based on the idea of committing concurrent transactions according to the total order of the requests that triggered the transactions. A comprehensive performance evaluation is carried out to characterize the effectiveness and limitations of this …
A Survey Of Applications And Human Motion Recognition With Microsoft Kinect, Roanna Lun, Wenbing Zhao
A Survey Of Applications And Human Motion Recognition With Microsoft Kinect, Roanna Lun, Wenbing Zhao
Wenbing Zhao
Microsoft Kinect, a low-cost motion sensing device, enables users to interact with computers or game consoles naturally through gestures and spoken commands without any other peripheral equipment. As such, it has commanded intense interests in research and development on the Kinect technology. In this paper, we present, a comprehensive survey on Kinect applications, and the latest research and development on motion recognition using data captured by the Kinect sensor. On the applications front, we review the applications of the Kinect technology in a variety of areas, including healthcare, education and performing arts, robotics, sign language recognition, retail services, workplace safety …
High Consequence Scenarios For North Korean Atmospheric Nuclear Tests With Policy Recommendations For The U.S. Government, Thomas S. Popik, Jordan T. Kearns, George H. Baker Iii, Henry F. Cooper, William R. Harris
High Consequence Scenarios For North Korean Atmospheric Nuclear Tests With Policy Recommendations For The U.S. Government, Thomas S. Popik, Jordan T. Kearns, George H. Baker Iii, Henry F. Cooper, William R. Harris
George H Baker
The government of North Korea has declared high-altitude EMP-capability to be a “strategic goal” and has also threatened an atmospheric test of a hydrogen bomb. Atmospheric nuclear tests have the potential to cripple satellites and the undersea cable networks critical to communication, and navigation necessary for trans-Pacific trade among the U.S., China, and other nations. When a nuclear warhead is detonated at high altitude, a series of electromagnetic pulses radiate downward within the line of sight of the blast. These pulses can disable equipment with miniature electronics and long conductors. Electric grid controls and transmission systems are especially vulnerable. Intense …
3d Multilevel Spin Transfer Torque Devices, J. Hong, M. Stone, K. Luongo, Q. Zheng, Z. Yuan, K. Xia, N. Xu, L. You, Sakhrat Khizroev
3d Multilevel Spin Transfer Torque Devices, J. Hong, M. Stone, K. Luongo, Q. Zheng, Z. Yuan, K. Xia, N. Xu, L. You, Sakhrat Khizroev
Sakhrat Khizroev
Spin-transfer torque magnetic tunneling junction devices capable of a multilevel three-dimensional (3D) information processing are studied in the sub-20-nm size range. The devices are built using He+ and Ne+ focused ion beam etching. It has been demonstrated that due to their extreme scalability and energy efficiency, these devices can significantly reduce the device footprint compared to the modern CMOS approaches and add advanced features in a 3D stack with a sub-20-nm size using a spin polarized current.
Physics Considerations In Targeted Anticancer Drug Delivery By Magnetoelectric Nanoparticles, Emmanuel Stimphil, Abhignyan Nagesetti, Rakesh Guduru, Tiffanie Stewart, Alexandra Rodzinski, Piang Liang, Sakhrat Khizroev
Physics Considerations In Targeted Anticancer Drug Delivery By Magnetoelectric Nanoparticles, Emmanuel Stimphil, Abhignyan Nagesetti, Rakesh Guduru, Tiffanie Stewart, Alexandra Rodzinski, Piang Liang, Sakhrat Khizroev
Sakhrat Khizroev
In regard to cancer therapy, magnetoelectric nanoparticles (MENs) have proven to be in a class of its own when compared to any other nanoparticle type. Like conventional magnetic nanoparticles, they can be used for externally controlled drug delivery via application of a magnetic field gradient and image-guided delivery. However, unlike conventional nanoparticles, due to the presence of a non-zero magnetoelectric effect, MENs provide a unique mix of important properties to address key challenges in modern cancer therapy: (i) a targeting mechanism driven by a physical force rather than antibody matching, (ii) a high-specificity delivery to enhance the cellular uptake of …
Multiferroic Coreshell Magnetoelectric Nanoparticles As Nmr Sensitive Nanoprobes For Cancer Cell Detection, Abhignyan Nagesetti, Alexandra Rodzinski, Emmanuel Stimphil, Tiffanie Stewart, Chooda Khanal, Ping Wang, Rakesh Guduru, Ping Liang, Irina U. Agoulnik, Jeffrey Horstmyer, Sakhrat Khizroev
Multiferroic Coreshell Magnetoelectric Nanoparticles As Nmr Sensitive Nanoprobes For Cancer Cell Detection, Abhignyan Nagesetti, Alexandra Rodzinski, Emmanuel Stimphil, Tiffanie Stewart, Chooda Khanal, Ping Wang, Rakesh Guduru, Ping Liang, Irina U. Agoulnik, Jeffrey Horstmyer, Sakhrat Khizroev
Sakhrat Khizroev
Magnetoelectric (ME) nanoparticles (MENs) intrinsically couple magnetic and electric fields. Using them as nuclear magnetic resonance (NMR) sensitive nanoprobes adds another dimension for NMR detection of biological cells based on the cell type and corresponding particle association with the cell. Based on ME property, for the first time we show that MENs can distinguish different cancer cells among themselves as well as from their normal counterparts. The core-shell nanoparticles are 30 nm in size and were not superparamagnetic. Due to presence of the ME effect, these nanoparticles can significantly enhance the electric field configuration on the cell membrane which serves …
Contributions To Hybrid Power Systems Incorporating Renewables For Desalination Systems, Nasser Alawhali
Contributions To Hybrid Power Systems Incorporating Renewables For Desalination Systems, Nasser Alawhali
nasser alawhali
No abstract provided.
Fabricating Ordered 2-D Nano-Structured Arrays Using Nanosphere Lithography, Chenlong Zhang, Sandra Cvetanovic, Joshua M. Pearce
Fabricating Ordered 2-D Nano-Structured Arrays Using Nanosphere Lithography, Chenlong Zhang, Sandra Cvetanovic, Joshua M. Pearce
Joshua M. Pearce
Recent advances in the use of plasmonic metamaterials to improve absorption of light in thin-film solar photovoltaic devices has created a demand for a scalable method of patterning large areas with metal nanostructures deposited in an ordered array. This article describes two methods of fabricating ordered 2D nanosphere colloidal films: spin coating and interface coating. The two methods are compared and parameter optimization discussed. The study reveals that:
• For smaller nanosphere sizes, spin coating is more favorable, while for larger nanospheres, the angled interface coating provides more coverage and uniformity.
• A surfactant-free approach for interface coating is developed …
General Design Procedures For Airport-Based Solar Photovoltaic Systems, Anurag Anurag, Jiemin Zhang, Jephias Gwamuri, Joshua M. Pearce
General Design Procedures For Airport-Based Solar Photovoltaic Systems, Anurag Anurag, Jiemin Zhang, Jephias Gwamuri, Joshua M. Pearce
Joshua M. Pearce
A source of large surface areas for solar photovoltaic (PV) farms that has been largely overlooked in the 13,000 United States of America (U.S.) airports. This paper hopes to enable PV deployments in most airports by providing an approach to overcome the three primary challenges identified by the Federal Aviation Administration (FAA): (1) reflectivity and glare; (2) radar interference; and (3) physical penetration of airspace. First, these challenges and precautions that must be adhered to for safe PV projects deployment at airports are reviewed and summarized. Since one of the core concerns for PV and airport symbiosis is solar panel …
General Design Procedure For Free And Open-Source Hardware For Scientific Equipment, Shane W. Oberloier, Joshua M. Pearce
General Design Procedure For Free And Open-Source Hardware For Scientific Equipment, Shane W. Oberloier, Joshua M. Pearce
Joshua M. Pearce
Distributed digital manufacturing of free and open-source scientific hardware (FOSH) used for scientific experiments has been shown to in general reduce the costs of scientific hardware by 90–99%. In part due to these cost savings, the manufacturing of scientific equipment is beginning to move away from a central paradigm of purchasing proprietary equipment to one in which scientists themselves download open-source designs, fabricate components with digital manufacturing technology, and then assemble the equipment themselves. This trend introduces a need for new formal design procedures that designers can follow when targeting this scientific audience. This study provides five steps in the …
Damage Analysis Modified Trac Computer Program (Damtrac), George H. Baker Iii, Alan D. Mcnutt, G. Bradford Shea, David M. Rubenstein
Damage Analysis Modified Trac Computer Program (Damtrac), George H. Baker Iii, Alan D. Mcnutt, G. Bradford Shea, David M. Rubenstein
George H Baker
A computer program tailored for EMP damage analysis of solid-state circuitry has been developed by modifying the existing TRAC network analysis program. Modification of the TRAC diode and transistor models to include breakdown parameters and the addition of a semiconductor device parameter library have greatly simplified the analyst's task. An added feature is a subroutine that automatically calculates the amplitude and duration of transient power dissipated in electronic circuit components.
Network Resilience Improvement Using Link Additions, Mohammed J. F. Alenazi, Egemen K. Çetinkaya, James P. G. Sterbenz
Network Resilience Improvement Using Link Additions, Mohammed J. F. Alenazi, Egemen K. Çetinkaya, James P. G. Sterbenz
Egemen K. Çetinkaya
No abstract provided.
Network Attack Experimentation Using Openflow-Enabled Geni Testbed, Mani Chaitanya Gorla, Venu Madhav Kamaraju, Egemen K. Çetinkaya
Network Attack Experimentation Using Openflow-Enabled Geni Testbed, Mani Chaitanya Gorla, Venu Madhav Kamaraju, Egemen K. Çetinkaya
Egemen K. Çetinkaya
No abstract provided.
Multilayer Network Resilience Analysis And Experimentation On Geni, Justin P. Rohrer, Egemen K. Çetinkaya, James P. G. Sterbenz
Multilayer Network Resilience Analysis And Experimentation On Geni, Justin P. Rohrer, Egemen K. Çetinkaya, James P. G. Sterbenz
Egemen K. Çetinkaya
GENI is evolving to provide a promising environment in which to do experimental research in the resilience and survivability of future networks, by allowing programmable control over topology and mechanism, while providing the scale and global reach needed to conduct network experiments far beyond the capabilities of a conventional testbed. We will use GENI in general, and the GpENI infrastructure (expanding to 40 clusters with 200 nodes worldwide), federated with the larger GENI PlanetLab control framework and interconnected to several ProtoGENI facilities to perform resilience and survivability experiments at scale, both in terms of node count and with the geographic …
Modelling Robustness Of Critical Infrastructure Networks, Srinath Pinnaka, Rajgopal Yarlagadda, Egemen K. Çetinkaya
Modelling Robustness Of Critical Infrastructure Networks, Srinath Pinnaka, Rajgopal Yarlagadda, Egemen K. Çetinkaya
Egemen K. Çetinkaya
No abstract provided.
Resilience Modelling Of Networks Against Adaptive Challenges, Egemen K. Çetinkaya, Justin P. Rohrer, James P. G. Sterbenz
Resilience Modelling Of Networks Against Adaptive Challenges, Egemen K. Çetinkaya, Justin P. Rohrer, James P. G. Sterbenz
Egemen K. Çetinkaya
No abstract provided.
Modelling Challenges And Attacks To Wireless Networks, Dongsheng Zhang, Santosh Ajith Gogi, Dan S. Broyles, Egemen K. Çetinkaya, James P. G. Sterbenz
Modelling Challenges And Attacks To Wireless Networks, Dongsheng Zhang, Santosh Ajith Gogi, Dan S. Broyles, Egemen K. Çetinkaya, James P. G. Sterbenz
Egemen K. Çetinkaya
A thorough understanding of the network behaviour when exposed to challenges is of paramount importance to construct a resilient MANET (mobile ad hoc network). However, modelling mobile and wireless networks as well as challenges against them is non-trivial due to dynamic and intermittent connectivity caused by channel fading and mobility of the nodes. We treat MANETs as time-varying graphs (TVGs) represented as a weighted adjacency matrix, in which the weights denote the link availability. We present how centrality-based attacks could affect network performance for different routing protocols. Furthermore, we model propagation loss models that represent realistic area-based challenges in wireless …